Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: crypto-policies | Distribution: Fedora Project |
Version: 20241128 | Vendor: Fedora Project |
Release: 1.gitbb7b0b0.fc42 | Build date: Thu Nov 28 18:41:54 2024 |
Group: Unspecified | Build host: buildhw-x86-03.iad2.fedoraproject.org |
Size: 140616 | Source RPM: crypto-policies-20241128-1.gitbb7b0b0.fc42.src.rpm |
Packager: Fedora Project | |
Url: https://gitlab.com/redhat-crypto/fedora-crypto-policies | |
Summary: System-wide crypto policies |
This package provides pre-built configuration files with cryptographic policies for various cryptographic back-ends, such as SSL/TLS libraries.
LGPL-2.1-or-later
* Thu Nov 28 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20241128-1.gitbb7b0b0 - openssl, BSI: add TLS 1.3 Brainpool identifiers * Tue Nov 26 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20241126-1.gitbb3f7dc - openssh: map mlkem768x25519-sha256 to KEM-ECDH & MLKEM768-X25519 & SHA2-256 - update-crypto-policies: don't output FIPS warning in fips mode * Wed Nov 06 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20241106-1.git35892de - gnutls: add GROUP-X25519-MLKEM768 and GROUP-SECP256R1-MLKEM768 - nss: add mlkem768x25519 * Mon Nov 04 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20241104-1.git4983c10 - openssl: use both names for SecP256r1MLKEM768 / X25519MLKEM768 * Mon Nov 04 2024 Miro HronĨok <mhroncok@redhat.com> - 20241018-2.gitce922cb - Silence harmless error messages from %pre scriptlet * Fri Oct 18 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20241018-1.gitce922cb - openssh, TEST-PQ: rename MLKEM key-exchange to MLKEM768 * Fri Oct 18 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20241018-1.git66c17d1 - openssh: add support for sntrup761x25519-sha512 and mlkem768x25519-sha256 - TEST-PQ: enable sntrup761x25519-sha512 and mlkem768x25519-sha256 for openssh * Thu Oct 10 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20241010-1.git8baf557 - LEGACY: enable 192-bit ciphers for nss pkcs12/smime - openssl: map NULL to TLS_SHA256_SHA256:TLS_SHA384_SHA384 * Fri Sep 27 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240927-1.git93b7251 - nss: be stricter with new purposes * Wed Aug 28 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240828-1.git5f66e81 - fips-mode-setup: small Argon2 detection fix * Mon Aug 26 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240826-1.gite824389 - SHA1: add __openssl_block_sha1_signatures = 0 * Thu Aug 22 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240822-1.git64c9381 - fips-mode-setup: block if LUKS devices using Argon2 are detected * Wed Aug 07 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240807-1.git5795660 - fips-crypto-policy-overlay: a unit to automount FIPS policy when fips=1 - fips-setup-helper: add a libexec helper for anaconda - fips-mode-setup: force --no-bootcfg when UKI is detected * Fri Aug 02 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240802-1.git2e5e430 - nss: rewrite backend for nss 3.101 * Thu Jul 25 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240725-1.git9555558 - gnutls: wire X25519-KYBER768 to GROUP-X25519-KYBER768 - openssh: make dss no longer enableble, support is dropped * Wed Jul 17 2024 Fedora Release Engineering <releng@fedoraproject.org> - 20240717-2.git154fd4e - Rebuilt for https://fedoraproject.org/wiki/Fedora_41_Mass_Rebuild * Wed Jul 17 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240717-1.git154fd4e - Changes/OpenSSLDistrustSHA1SigVer: implement, see below - DEFAULT: switch to rh-allow-sha1-signatures = no... - TEST-FEDORA41: reset to DEFAULT - FEDORA40: introduce with the previous contents of DEFAULT - nss: wire XYBER768D00 to X25519-KYBER768, not KYBER768 - TEST-PQ: disable KYBER768 * Tue Jul 16 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240715-2.gitf8b6a29 - fix running pre scriptlet in first transaction ever, pre-coreutils * Mon Jul 15 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240715-1.gitf8b6a29 - BSI: Update BSI policy for new 2024 minimum recommendations - java: use and include jdk.disabled.namedCurves - ec_min_size: introduce and use in java, default to 256 - java: stop specifying jdk.tls.namedGroups in javasystem - java: drop unused javasystem backend * Fri Jun 28 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240628-1.gitddd11d3 - nss: wire KYBER768 to XYBER768D00 - java: start controlling / disable DTLSv1.0 - java: disable anon ciphersuites, tying them to NULL - java: respect more key size restrictions - java: specify jdk.tls.namedGroups system property - java: make hash, mac and sign more orthogonal - fips-mode-setup: add another scary "unsupported" - fips-mode-setup: flashy ticking warning upon use - BSI: switch to 3072 minimum RSA key size * Tue May 21 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240521-1.gitf71d135 - nss: unconditionally include p11-kit-proxy - TEST-PQ: update algorithm list, mark all PQ algorithms experimental * Wed May 15 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240515-1.gita24a14b - gnutls: use tls-session-hash option, enforcing EMS in FIPS mode - gnutls: DTLS 0.9 is controllable again - gnutls: remove extraneous newline - openssh: remove support for old names of RequiredRSASize * Wed Mar 20 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240320-1.git58e3d95 - modules/FEDORA32, FEDORA38, TEST-FEDORA39: drop - openssl: mark liboqsprovider groups optional with ? - TEST-PQ: add more group and sign values, marked experimental - TEST-FEDORA41: add a new policy with __openssl_block_sha1_signatures = 1 - TEST-PQ: also enable sntrup761x25519-sha512@openssh.com * Mon Mar 04 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240304-1.git0375239 - packaging: remove perl build-dependency, it's not needed anymore - packaging: stop linting at check-time, relying on upstream CI instead - packaging: drop stale workarounds - libreswan: do not use up pfs= / ikev2= keywords for default behaviour * Tue Feb 27 2024 Jiri Vanek <jvanek@redhat.com> - 20240201-2.git9f501f3 - Rebuilt for java-21-openjdk as system jdk * Thu Feb 01 2024 Alexander Sosedkin <asosedkin@redhat.com> - 20240201-1.git9f501f3 - fips-finish-install: make sure ostree is detected in chroot - fips-mode-setup: make sure ostree is detected in chroot - java: disable ChaCha20-Poly1305 where applicable * Wed Jan 24 2024 Fedora Release Engineering <releng@fedoraproject.org> - 20231204-3.git1e3a2e4 - Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild * Fri Jan 19 2024 Fedora Release Engineering <releng@fedoraproject.org> - 20231204-2.git1e3a2e4 - Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild * Mon Dec 04 2023 Alexander Sosedkin <asosedkin@redhat.com> - 20231204-1.git1e3a2e4 - TEST-PQ: add a subpolicy to test post-quantum algorithms. Do not rely on. * Mon Nov 13 2023 Clemens Lang <cllang@redhat.com> - 20231113-1.gitb402e82 - fips-mode-setup: Write error messages to stderr - fips-mode-setup: Fix some shellcheck warnings - fips-mode-setup: Fix test for empty /boot - fips-mode-setup: Avoid 'boot=UUID=' if /boot == / * Thu Nov 09 2023 Clemens Lang <cllang@redhat.com> - 20231109-1.gitadb5572 - Restore support for scoped ssh_etm directives - Print matches in syntax deprecation warnings * Tue Nov 07 2023 Clemens Lang <cllang@redhat.com> - 20231107-1.gitd5877b3 - fips-mode-setup: Fix usage with --no-bootcfg * Tue Nov 07 2023 Clemens Lang <cllang@redhat.com> - 20231107-1.git8f49dfa - turn ssh_etm into an etm@SSH tri-state - fips-mode-setup: increase chroot-friendliness (rhbz#2164847) * Wed Sep 20 2023 Alexander Sosedkin <asosedkin@redhat.com> - 20230920-1.git570ea89 - OSPP subpolicy: tighten beyond reason for OSPP 4.3 - fips-mode-setup: more thorough --disable, still unsupported * Tue Jul 25 2023 Alexander Sosedkin <asosedkin@redhat.com> - 20230731-1.git5ed06e0 - BSI: start a BSI TR 02102 policy - krb5: sort enctypes mac-first, cipher-second, prioritize SHA-2 ones - FIPS: enforce EMS in FIPS mode - NO-ENFORCE-EMS: add subpolicy to undo the EMS enforcement in FIPS mode - nss: implement EMS enforcement in FIPS mode (not enabled yet) - openssl: implement EMS enforcement in FIPS mode - gnutls: implement EMS enforcement in FIPS mode (not enabled yet) - docs: replace `FIPS 140-2` with just `FIPS 140` * Wed Jul 19 2023 Fedora Release Engineering <releng@fedoraproject.org> - 20230614-2.git5f3458e - Rebuilt for https://fedoraproject.org/wiki/Fedora_39_Mass_Rebuild * Wed Jun 14 2023 Alexander Sosedkin <asosedkin@redhat.com> - 20230614-1.git5f3458e - policies: restore group order to old OpenSSL default order * Thu Apr 20 2023 Alexander Sosedkin <asosedkin@redhat.com> - 20230420-1.git3d08ae7 - openssl: specify Groups explicitly - openssl: add support for Brainpool curves * Wed Mar 01 2023 Alexander Sosedkin <asosedkin@redhat.com> - 20230301-1.git2ea6d2a - rpm-sequoia: add separate rpm-sequoia backend - DEFAULT: allow SHA-1 and 1024 bit DSA in RPM (https://pagure.io/fesco/issue/2960) * Mon Feb 20 2023 Alexander Sosedkin <asosedkin@redhat.com> - 20230220-1.git8c7de04 - Makefile: support asciidoc 10 * Thu Jan 19 2023 Fedora Release Engineering <releng@fedoraproject.org> - 20221215-2.gita4c31a3 - Rebuilt for https://fedoraproject.org/wiki/Fedora_38_Mass_Rebuild * Thu Dec 15 2022 Alexander Sosedkin <asosedkin@redhat.com> - 20221215-1.gita4c31a3 - bind: expand the list of disableable algorithms
/etc/crypto-policies /etc/crypto-policies/back-ends /etc/crypto-policies/back-ends/bind.config /etc/crypto-policies/back-ends/gnutls.config /etc/crypto-policies/back-ends/java.config /etc/crypto-policies/back-ends/krb5.config /etc/crypto-policies/back-ends/libreswan.config /etc/crypto-policies/back-ends/libssh.config /etc/crypto-policies/back-ends/nss.config /etc/crypto-policies/back-ends/openssh.config /etc/crypto-policies/back-ends/opensshserver.config /etc/crypto-policies/back-ends/openssl.config /etc/crypto-policies/back-ends/openssl_fips.config /etc/crypto-policies/back-ends/opensslcnf.config /etc/crypto-policies/back-ends/rpm-sequoia.config /etc/crypto-policies/back-ends/sequoia.config /etc/crypto-policies/config /etc/crypto-policies/local.d /etc/crypto-policies/policies /etc/crypto-policies/policies/modules /etc/crypto-policies/state /etc/crypto-policies/state/CURRENT.pol /etc/crypto-policies/state/current /usr/lib/systemd/system/fips-crypto-policy-overlay.service /usr/libexec/fips-crypto-policy-overlay /usr/libexec/fips-setup-helper /usr/share/crypto-policies /usr/share/crypto-policies/DEFAULT /usr/share/crypto-policies/DEFAULT/bind.txt /usr/share/crypto-policies/DEFAULT/gnutls.txt /usr/share/crypto-policies/DEFAULT/java.txt /usr/share/crypto-policies/DEFAULT/krb5.txt /usr/share/crypto-policies/DEFAULT/libreswan.txt /usr/share/crypto-policies/DEFAULT/libssh.txt /usr/share/crypto-policies/DEFAULT/nss.txt /usr/share/crypto-policies/DEFAULT/openssh.txt /usr/share/crypto-policies/DEFAULT/opensshserver.txt /usr/share/crypto-policies/DEFAULT/openssl.txt /usr/share/crypto-policies/DEFAULT/openssl_fips.txt /usr/share/crypto-policies/DEFAULT/opensslcnf.txt /usr/share/crypto-policies/DEFAULT/rpm-sequoia.txt /usr/share/crypto-policies/DEFAULT/sequoia.txt /usr/share/crypto-policies/EMPTY /usr/share/crypto-policies/EMPTY/bind.txt /usr/share/crypto-policies/EMPTY/gnutls.txt /usr/share/crypto-policies/EMPTY/java.txt /usr/share/crypto-policies/EMPTY/krb5.txt /usr/share/crypto-policies/EMPTY/libreswan.txt /usr/share/crypto-policies/EMPTY/libssh.txt /usr/share/crypto-policies/EMPTY/nss.txt /usr/share/crypto-policies/EMPTY/openssh.txt /usr/share/crypto-policies/EMPTY/opensshserver.txt /usr/share/crypto-policies/EMPTY/openssl.txt /usr/share/crypto-policies/EMPTY/openssl_fips.txt /usr/share/crypto-policies/EMPTY/opensslcnf.txt /usr/share/crypto-policies/EMPTY/rpm-sequoia.txt /usr/share/crypto-policies/EMPTY/sequoia.txt /usr/share/crypto-policies/FIPS /usr/share/crypto-policies/FIPS/bind.txt /usr/share/crypto-policies/FIPS/gnutls.txt /usr/share/crypto-policies/FIPS/java.txt /usr/share/crypto-policies/FIPS/krb5.txt /usr/share/crypto-policies/FIPS/libreswan.txt /usr/share/crypto-policies/FIPS/libssh.txt /usr/share/crypto-policies/FIPS/nss.txt /usr/share/crypto-policies/FIPS/openssh.txt /usr/share/crypto-policies/FIPS/opensshserver.txt /usr/share/crypto-policies/FIPS/openssl.txt /usr/share/crypto-policies/FIPS/openssl_fips.txt /usr/share/crypto-policies/FIPS/opensslcnf.txt /usr/share/crypto-policies/FIPS/rpm-sequoia.txt /usr/share/crypto-policies/FIPS/sequoia.txt /usr/share/crypto-policies/FUTURE /usr/share/crypto-policies/FUTURE/bind.txt /usr/share/crypto-policies/FUTURE/gnutls.txt /usr/share/crypto-policies/FUTURE/java.txt /usr/share/crypto-policies/FUTURE/krb5.txt /usr/share/crypto-policies/FUTURE/libreswan.txt /usr/share/crypto-policies/FUTURE/libssh.txt /usr/share/crypto-policies/FUTURE/nss.txt /usr/share/crypto-policies/FUTURE/openssh.txt /usr/share/crypto-policies/FUTURE/opensshserver.txt /usr/share/crypto-policies/FUTURE/openssl.txt /usr/share/crypto-policies/FUTURE/openssl_fips.txt /usr/share/crypto-policies/FUTURE/opensslcnf.txt /usr/share/crypto-policies/FUTURE/rpm-sequoia.txt /usr/share/crypto-policies/FUTURE/sequoia.txt /usr/share/crypto-policies/LEGACY /usr/share/crypto-policies/LEGACY/bind.txt /usr/share/crypto-policies/LEGACY/gnutls.txt /usr/share/crypto-policies/LEGACY/java.txt /usr/share/crypto-policies/LEGACY/krb5.txt /usr/share/crypto-policies/LEGACY/libreswan.txt /usr/share/crypto-policies/LEGACY/libssh.txt /usr/share/crypto-policies/LEGACY/nss.txt /usr/share/crypto-policies/LEGACY/openssh.txt /usr/share/crypto-policies/LEGACY/opensshserver.txt /usr/share/crypto-policies/LEGACY/openssl.txt /usr/share/crypto-policies/LEGACY/openssl_fips.txt /usr/share/crypto-policies/LEGACY/opensslcnf.txt /usr/share/crypto-policies/LEGACY/rpm-sequoia.txt /usr/share/crypto-policies/LEGACY/sequoia.txt /usr/share/crypto-policies/back-ends /usr/share/crypto-policies/back-ends/DEFAULT /usr/share/crypto-policies/back-ends/DEFAULT/bind.config /usr/share/crypto-policies/back-ends/DEFAULT/gnutls.config /usr/share/crypto-policies/back-ends/DEFAULT/java.config /usr/share/crypto-policies/back-ends/DEFAULT/krb5.config /usr/share/crypto-policies/back-ends/DEFAULT/libreswan.config /usr/share/crypto-policies/back-ends/DEFAULT/libssh.config /usr/share/crypto-policies/back-ends/DEFAULT/nss.config /usr/share/crypto-policies/back-ends/DEFAULT/openssh.config /usr/share/crypto-policies/back-ends/DEFAULT/opensshserver.config /usr/share/crypto-policies/back-ends/DEFAULT/openssl.config /usr/share/crypto-policies/back-ends/DEFAULT/openssl_fips.config /usr/share/crypto-policies/back-ends/DEFAULT/opensslcnf.config /usr/share/crypto-policies/back-ends/DEFAULT/rpm-sequoia.config /usr/share/crypto-policies/back-ends/DEFAULT/sequoia.config /usr/share/crypto-policies/back-ends/FIPS /usr/share/crypto-policies/back-ends/FIPS/bind.config /usr/share/crypto-policies/back-ends/FIPS/gnutls.config /usr/share/crypto-policies/back-ends/FIPS/java.config /usr/share/crypto-policies/back-ends/FIPS/krb5.config /usr/share/crypto-policies/back-ends/FIPS/libreswan.config /usr/share/crypto-policies/back-ends/FIPS/libssh.config /usr/share/crypto-policies/back-ends/FIPS/nss.config /usr/share/crypto-policies/back-ends/FIPS/openssh.config /usr/share/crypto-policies/back-ends/FIPS/opensshserver.config /usr/share/crypto-policies/back-ends/FIPS/openssl.config /usr/share/crypto-policies/back-ends/FIPS/openssl_fips.config /usr/share/crypto-policies/back-ends/FIPS/opensslcnf.config /usr/share/crypto-policies/back-ends/FIPS/rpm-sequoia.config /usr/share/crypto-policies/back-ends/FIPS/sequoia.config /usr/share/crypto-policies/back-ends/FUTURE /usr/share/crypto-policies/back-ends/FUTURE/bind.config /usr/share/crypto-policies/back-ends/FUTURE/gnutls.config /usr/share/crypto-policies/back-ends/FUTURE/java.config /usr/share/crypto-policies/back-ends/FUTURE/krb5.config /usr/share/crypto-policies/back-ends/FUTURE/libreswan.config /usr/share/crypto-policies/back-ends/FUTURE/libssh.config /usr/share/crypto-policies/back-ends/FUTURE/nss.config /usr/share/crypto-policies/back-ends/FUTURE/openssh.config /usr/share/crypto-policies/back-ends/FUTURE/opensshserver.config /usr/share/crypto-policies/back-ends/FUTURE/openssl.config /usr/share/crypto-policies/back-ends/FUTURE/openssl_fips.config /usr/share/crypto-policies/back-ends/FUTURE/opensslcnf.config /usr/share/crypto-policies/back-ends/FUTURE/rpm-sequoia.config /usr/share/crypto-policies/back-ends/FUTURE/sequoia.config /usr/share/crypto-policies/back-ends/LEGACY /usr/share/crypto-policies/back-ends/LEGACY/bind.config /usr/share/crypto-policies/back-ends/LEGACY/gnutls.config /usr/share/crypto-policies/back-ends/LEGACY/java.config /usr/share/crypto-policies/back-ends/LEGACY/krb5.config /usr/share/crypto-policies/back-ends/LEGACY/libreswan.config /usr/share/crypto-policies/back-ends/LEGACY/libssh.config /usr/share/crypto-policies/back-ends/LEGACY/nss.config /usr/share/crypto-policies/back-ends/LEGACY/openssh.config /usr/share/crypto-policies/back-ends/LEGACY/opensshserver.config /usr/share/crypto-policies/back-ends/LEGACY/openssl.config /usr/share/crypto-policies/back-ends/LEGACY/openssl_fips.config /usr/share/crypto-policies/back-ends/LEGACY/opensslcnf.config /usr/share/crypto-policies/back-ends/LEGACY/rpm-sequoia.config /usr/share/crypto-policies/back-ends/LEGACY/sequoia.config /usr/share/crypto-policies/default-config /usr/share/crypto-policies/default-fips-config /usr/share/crypto-policies/policies /usr/share/crypto-policies/policies/BSI.pol /usr/share/crypto-policies/policies/DEFAULT.pol /usr/share/crypto-policies/policies/EMPTY.pol /usr/share/crypto-policies/policies/FEDORA40.pol /usr/share/crypto-policies/policies/FIPS.pol /usr/share/crypto-policies/policies/FUTURE.pol /usr/share/crypto-policies/policies/GOST-ONLY.pol /usr/share/crypto-policies/policies/LEGACY.pol /usr/share/crypto-policies/policies/NEXT.pol /usr/share/crypto-policies/policies/TEST-FEDORA41.pol /usr/share/crypto-policies/policies/modules /usr/share/crypto-policies/policies/modules/AD-SUPPORT.pmod /usr/share/crypto-policies/policies/modules/ECDHE-ONLY.pmod /usr/share/crypto-policies/policies/modules/GOST.pmod /usr/share/crypto-policies/policies/modules/NO-CAMELLIA.pmod /usr/share/crypto-policies/policies/modules/NO-ENFORCE-EMS.pmod /usr/share/crypto-policies/policies/modules/NO-SHA1.pmod /usr/share/crypto-policies/policies/modules/OSPP.pmod /usr/share/crypto-policies/policies/modules/SHA1.pmod /usr/share/crypto-policies/policies/modules/TEST-PQ.pmod /usr/share/crypto-policies/reload-cmds.sh /usr/share/licenses/crypto-policies /usr/share/licenses/crypto-policies/COPYING.LESSER /usr/share/man/man7/crypto-policies.7.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Sat Dec 21 05:45:14 2024